31 research outputs found

    Implementation of an identity based encryption sub-system for secure e-mail and other applications

    Get PDF
    This thesis describes the requirements for, and design of, a suite of a sub-systems which support the introduction of Identity Based Encryption (IBE) to Intrenet communications. Current methods for securing Internet transmission are overly complex to users and require expensive and complex supporting infrastructure for distributing credentials such as certificates or public keys. Identity Based Encryption holds a promise of simplifying the process without compromising the security. In this thesis I will outline the theory behind the cryptography required , give a background to e-M ail and messaging protocols,the current security methods, the infrastructure used, the issues with these methods, and the break through that recent innovations in Identity Based Encryption hopes to deliver.I will describe an implementation of a sub-system that secures e-Mail and other protocolsin desktop platforms with as little impact on the end user as possible

    Elliptic Curve Cryptography on Modern Processor Architectures

    Get PDF
    Abstract Elliptic Curve Cryptography (ECC) has been adopted by the US National Security Agency (NSA) in Suite "B" as part of its "Cryptographic Modernisation Program ". Additionally, it has been favoured by an entire host of mobile devices due to its superior performance characteristics. ECC is also the building block on which the exciting field of pairing/identity based cryptography is based. This widespread use means that there is potentially a lot to be gained by researching efficient implementations on modern processors such as IBM's Cell Broadband Engine and Philip's next generation smart card cores. ECC operations can be thought of as a pyramid of building blocks, from instructions on a core, modular operations on a finite field, point addition & doubling, elliptic curve scalar multiplication to application level protocols. In this thesis we examine an implementation of these components for ECC focusing on a range of optimising techniques for the Cell's SPU and the MIPS smart card. We show significant performance improvements that can be achieved through of adoption of EC

    How to sequence 10,000 bacterial genomes and retain your sanity: an accessible, efficient and global approach

    Get PDF
    Non-typhoidal Salmonella(NTS)are typically associated with enterocolitis and linked to the industrialisation of food production. In recent years, NTS has been associated with invasive disease (iNTS disease) causing an estimated 77,000 deaths each year worldwide; 80% of mortality occurs in sub-Saharan Africa. New clades of S. Typhimurium and S. Enteritidis have been identified, which are characterised by genomic degradation, altered prophage repertoires and novel multidrug resistant plasmids. To understand how these clades are contributing to the burden and severity of iNTS disease, it is crucial to expand genome-based surveillance to cover more countries, and incorporate historical isolates to generate an evolutionary timeline of the development of iNTS. We developedand validateda robust and inexpensive method for large-scale collection and sequencing of bacterial genomes. The “10,000 Salmonella genomes” project established a worldwide research collaboration to generate information relevant to the epidemiology, drug resistance and virulence factors of Salmonellae using a whole-genome sequencing approach. By streamlining collection of isolates and developing an efficient logistics pipeline, we gathered 10,419 clinical and environmental isolates from collections in low and middle-income countries within six months. Genome sequences are now available for isolates from 51 countries/territories dating from 1949 to 2017, with ~80 % representing African and Latin-American datasets. Our method can be applied to other large sample collections that require maximisation of resources within a limited timeframe. Detailed genome analyses are in progress and it is hoped that the resulting data will contribute to public health control strategies in low and middle-income countries

    An accessible, efficient and global approach for the large-scale sequencing of bacterial genomes

    Get PDF
    We have developed an efficient and inexpensive pipeline for streamlining large-scale collection and genome sequencing of bacterial isolates. Evaluation of this method involved a worldwide research collaboration focused on the model organism Salmonella enterica, the 10KSG consortium. Following the optimization of a logistics pipeline that involved shipping isolates as thermolysates in ambient conditions, the project assembled a diverse collection of 10,419 isolates from low- and middle-income countries. The genomes were sequenced using the LITE pipeline for library construction, with a total reagent cost of less than USD$10 per genome. Our method can be applied to other large bacterial collections to underpin global collaborations

    Placing the library at the heart of plagiarism prevention: The University of Bradford experience.

    Get PDF
    yesPlagiarism is a vexed issue for Higher Education, affecting student transition, retention and attainment. This paper reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course introduces new students to the concepts surrounding plagiarism with the aim to prevent plagiarism breaches. Since the Plagiarism Avoidance for New Students course was introduced there has been a significant drop in students referred to the disciplinary programme. This paper discusses the background to both courses and the challenges of implementation

    Implementing Cryptographic Pairings on Smartcards

    Get PDF
    Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations of Identity-Based Encryption (IBE). In this paper we describe the implementation of various pairings on a contemporary 32-bit smart-card, the Philips HiPerSmart , an instantiation of the MIPS-32 based SmartMIPS architecture. Three types of pairing are considered, first the standard Tate pairing on a nonsupersingular curve E(Fp ), second the Ate pairing, also on a nonsupersingular curve E(Fp ), and finally the #T pairing on a supersingular curve E(F2 m ). We demonstrate that pairings can be calculated as e#ciently as classic cryptographic primitives on this architecture, with a calculation time of as little as 0.15 seconds

    Insect pollinators: linking research and policy. Workshop report.

    Get PDF
    EXECUTIVE SUMMARY Pollinators interact with plants to underpin wider biodiversity, ecosystem function, ecosystem services to agricultural crops and ultimately human nutrition. The conservation of pollinators is thus an important goal. Pollinators and pollination represent a tractable example of how biodiversity can be linked to an ecosystem service. This represents a case study for exploring the impacts of various policy instruments aiming to halt/reverse the loss of ecosystem services. There is a need to understand how multiple pressures (e.g. habitat loss, fragmentation and degradation, climate change, pests and diseases, invasive species and environmental chemicals) can combine or interact to affect diversity, abundance and health of different pollinator groups. Decision makers need to balance consideration of the effects of single pressures on pollinators against the suite of other pressures on pollinators. For instance, the threat from pesticide use (with its high public and media profile) also needs to be considered in the context of the other threats facing pollinators and balanced against the need for food security. An independent review of the balance of risks across pollinator groups from pesticide use would help synthesise current knowledge into an accessible form for decision makers. To manage or lessen these threats to pollinators (wild and managed) and pollination requires improved knowledge about their basic ecology. We still need to know where and in what numbers different pollinator species occur, how they use different environments, how they interact with each other through shared plants and diseases and how wild pollinator abundance is changing. Decision makers need clear factual evidence for i) the relative contribution of different managed and wild pollinator groups to wildflower and crop pollination and ii) how this varies across different land-uses, ecosystems and regions. Addressing these basic and applied questions will improve our ability to forecast impacts on pollination service delivery to agricultural crops arising from current and future environmental changes, pesticide use and emerging diseases. The development of a long-term, multi-scale monitoring scheme to monitor trends in pollinator (wild and managed) population size and delivery of pollination services (ideally tied to data collection on land-use, pesticide applications and disease incidence at relevant spatial scales) would provide the evidence base for developing the effectiveness of policy and management interventions over time. Such a monitoring scheme would benefit from including research council organisations (e.g. CEH), governmental departments (e.g. Fera), universities, museums and NGOs (e.g. BBKA,SBA, Bumblebee Conservation Trust etc) Insect Pollinators: linking research and policy Workshop Report | 5 In the context of agricultural intensification and conservation we need to establish what type, quality and quantity of interventions (e.g. agri-environment schemes, protected areas) are needed, where to place them and how they can sustain different pollinator populations and effective pollination services. Current monitoring of the risks from diseases and pesticides requires broadening to consider other insects aside from honey bees, unless we can demonstrate that honey bees are good surrogates for all other pollinators. There is a need to increase confidence in regulatory risk assessments pertaining to pathogens and pesticides by incorporating other pollinator species, investigating chronic exposure to multiple chemicals and using field relevant dosages (specific to regions, not using other data sources as surrogates). At present the effects of spatial, social and temporal scales on the benefits stakeholders receive from pollination services are only beginning to be understood. Economic valuation of pollination services can help optimise the cost-effectiveness of service management measures and offer new opportunities to incentivise action or raise awareness among stakeholders. Novel tools and instruments (e.g. education and training) are needed to translate broad international (e.g. CBD, EU Biodiversity Strategy) and national (e.g. England‟s Biodiversity Strategy) policies into local actor (e.g. beekeeper, farmer, citizen scientist) contributions to meet biodiversity commitments Refocusing some public funding to link basic science to development of practical solutions (e.g. better crop protection products, improved disease resistance or treatment) could help science deliver better-targeted evidence for pollinator protection. Scientists need to make more use of opportunities (e.g. POSTnotes1; practitioner guides) to transfer knowledge to a broad audience in order to better influence decision maker and practitioner behaviours. Improved knowledge exchange between scientists and decision makers is important to combating threats to pollination. Central to this is improved understanding of the respective positions of policy makers and scientists. For instance, policy-makers usually need to be presented with a range of options to balance against other areas of policy. Science does not always arrive at a consensus due to uncertainties in data or models. Policy-makers need to understand that scientists are communicating the “best available knowledge at present” and that consequently it is not always possible to give a definitive answer
    corecore